[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Security policy ambiguities - XSA-108 process post-mortem


  • To: xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: James Bulpin <James.Bulpin@xxxxxxxxxx>
  • Date: Wed, 29 Oct 2014 13:27:55 +0000
  • Accept-language: en-GB, en-US
  • Delivery-date: Wed, 29 Oct 2014 13:29:59 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xen.org>
  • Thread-index: AQHP5t/WRQoBHCrgp0SXTwdMEfuWDZxHJsEg
  • Thread-topic: [Xen-devel] Security policy ambiguities - XSA-108 process post-mortem

George Dunlap writes ("Security policy ambiguities - XSA-108 process 
post-mortem"):
> [snip]
>
> As far as I can tell we basically have the following options:
> 
> 1. Never allow people to deploy during the embargo period.
> 
> This eliminates the possibility that someone will be helped to gain
> information about the vulnerability by comparing a patched system to an
> unpatched one.  However, it means that cloud operators may spend a short
> amount of time "publicly vulnerable" while they reboot their systems.  I
> assume it would significantly increase the difficulty of coordinating
> such a deployment, as you would have to reboot *all* your servers in the
> smallest time window possible, instead of being able to stage it over
> several days.
> 
> It also increases the temptation for operators to "cheat" by starting
> the process a little bit early.  This I think could lead to more
> significant problems community-wise: with incentive to break the rules,
> enforcement becomes an issue -- and I'm sure none of the team want to
> have to deal with that.
> 
> 2. Always allow people to deploy during the embargo period.
> 
> This is simple on the security team, and minimizes the "publicly
> vulnerable time".  It makes deployments easier to coordinate, and avoids
> adding an incentive for "bending" the rules.
> 
> However, it does in theory allow an attacker the ability to gain
> information about the vulnerability by comparing patched systems to
> unpatched systems.  In practice, the vast majority of the time the
> measurable difference in functionality will be like finding a needle in
> a haystack; and if the attacker had ever even thought to try the
> functionality (e.g., XSA-7), she would have already known about the
> bug.  But that may not always be the case.
> 
> 3. Have the security team attempt to evaluate the risk.
> 
> This adds work to the security team.  But it at least allows the
> possibility that, in cases where it's pretty clear that early deployment
> *would* give clear hints to an attacker, they could decide to include
> deployment in the embargo.
> 
> 4. Have individual cloud operators evaluate the risk.
> 
> This seems like a recipe for disaster.
> 
> I think #1 is too risky, particularly from a community perspective. But
> maybe I'm being a bit pessimistic.
> 
> In my mind, #3 is basically exactly the same as #2, except that in cases
> where there would clearly be a problem, the team has an option of
> embargoing deployment as well.
> 
> I just spent about 10 minutes skimming through the 80 or so XSAs on
> http://xenbits.xen.org/xsa/.  In most of the cases, it was pretty clear
> that the only behavior that changed would be behavior which would
> already have clued an attacker into the existence of a potential
> vulnerability.  For example, in XSA-108, beforehand some reads from the
> reserved x2apic range would have returned values whereas now they would
> #GP.  But if the attacker knew that they returned values, it already
> would have occurred to her to see if they returned anything of interest.
> 
> I didn't notice a single exception to this, though admittedly I didn't
> spend much time looking at it.
> 
> This suggests to me that #2 is probably not that dangerous the majority
> of the time.  It also suggests that there may be a simple criteria that
> can be applied for #3 that can eliminate most of the guesswork: Is
> anything in the original behavior being changed likely to lead an
> attacker to think that there may be a vulnerability there?  In the case
> of basically all of them, I think the answer there would be "yes".
> 
> So at the moment I would favor #3, then #2; I'm not in favor of #1 but I
> wouldn't strenuously argue against it.  But the main thing is that we
> have a clear policy.

I like #3 but as clarified in this paragraph:

> In my mind, #3 is basically exactly the same as #2, except that in cases
> where there would clearly be a problem, the team has an option of
> embargoing deployment as well.

i.e. embargoing deployment is an exceptional case.

Cheers,
James

-- 
James Bulpin
Sr. Director, Technology, XenServer/Networking, Cloud & Service Provider Group
Citrix Systems Inc.


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.